{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:17:38Z","timestamp":1725560258965},"publisher-location":"Wiesbaden","reference-count":20,"publisher":"Vieweg+Teubner","isbn-type":[{"type":"print","value":"9783834809582"},{"type":"electronic","value":"9783834893635"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-8348-9363-5_29","type":"book-chapter","created":{"date-parts":[[2010,7,21]],"date-time":"2010-07-21T05:27:20Z","timestamp":1279690040000},"page":"291-301","source":"Crossref","is-referenced-by-count":1,"title":["Using Compilers to Enhance Cryptographic Product Development"],"prefix":"10.1007","author":[{"given":"E.","family":"Bangerter","sequence":"first","affiliation":[]},{"given":"M.","family":"Barbosa","sequence":"additional","affiliation":[]},{"given":"D.","family":"Bernstein","sequence":"additional","affiliation":[]},{"given":"I.","family":"Damg\u00e5rd","sequence":"additional","affiliation":[]},{"given":"D.","family":"Page","sequence":"additional","affiliation":[]},{"given":"J. I.","family":"Pagter","sequence":"additional","affiliation":[]},{"given":"A.-R.","family":"Sadeghi","sequence":"additional","affiliation":[]},{"given":"S.","family":"Sovio","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"29_CR1","first-page":"29","volume":"2523","author":"D. Agrawal","year":"2002","unstructured":"D. Agrawal, B. Archambeault, J.R. Rao and P. Rohatgi. The EM Side-Channel(s). In Cryptographic Hardware and Embedded Systems (CHES), Springer-Verlag LNCS 2523, 29-45, 2002.","journal-title":"In Cryptographic Hardware and Embedded Systems (CHES)"},{"key":"29_CR2","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1007\/11967668_15","volume":"4377","author":"O. Acri\u00e7mez","year":"2007","unstructured":"O. Acri\u00e7mez, J-P. Seifert and \u00c7.K. Ko\u00e7. Predicting Secret Keys via Branch Prediction. In Topics in Cryptology (CT-RSA), Springer-Verlag LNCS 4377, 225-242, 2007.","journal-title":"Topics in Cryptology (CT-RSA)"},{"key":"29_CR3","doi-asserted-by":"crossref","unstructured":"P. Bogetoft, D. L. Christensen, I. Damg\u00e5rd, M. Geisler, T. Jakobsen, M. Krigaard, J. D. Nielsen, J. B. Nielsen, K. Nielsen, J. Pagter, M. Schwartzbach, T. Toft. Multiparty Computation Goes Live. To appear in Financial Cryptography and Data Security (FC), 2009. Available as ePrint Archive, Report 2008\/069 at http:\/\/eprint.iacr.org .","DOI":"10.1007\/978-3-642-03549-4_20"},{"key":"29_CR4","unstructured":"D.J. Bernstein. Cache-timing attacks on AES. Available from: http:\/\/cr.yp.to\/antiforgery\/cachetim-ing-20050414.pdf"},{"key":"29_CR5","first-page":"132","volume":"2004","author":"E. Brickell","year":"2004","unstructured":"E. Brickell, J. Camenisch, and L. Chen. Direct anonymous attestation. In Proc. ACM CCS 2004, pages 132-145. ACM, 2004.","journal-title":"Proc. ACM CCS"},{"key":"29_CR6","doi-asserted-by":"crossref","unstructured":"J. Camenisch and E. V. Herreweghen. Design and implementation of the idemix anonymous credential system. In Proc. ACM CCS 2002, pages 21{30. ACM, 2002. http:\/\/www.zurich.ibm.com\/security\/idemix\/ .","DOI":"10.1145\/586111.586114"},{"key":"29_CR7","unstructured":"The Common Criteria Recognition Agreement Members. Common criteria for information technology security evaluation. Available from: http:\/\/www.commoncriteriaportal.org\/ , September 2006."},{"key":"29_CR8","unstructured":"J.-E. Ekberg and M. Kyl\u00e4np\u00e4\u00e4. Mobile trusted module, 2007. NRC report NRC-TR-2007-015 http:\/\/research.nokia.com\/flles\/NRCTR2007015.pdf"},{"key":"29_CR9","first-page":"203","volume":"5157","author":"T Eisenbarth","year":"2008","unstructured":"T Eisenbarth, T Kasper, A. Moradi, C. Paar, M. Salmasizadeh, M.T Manzuri Shalmani. On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoqCode Hopping Scheme. In Advances in Cryptology (CRYPTO), Springer-Verlag LNCS 5157, 203-220, 2008.","journal-title":"Advances in Cryptology (CRYPTO)"},{"key":"29_CR10","first-page":"97","volume":"5283","author":"F.D. Garcia","year":"2008","unstructured":"F.D. Garcia, G. de Koning Gans, R. Muijrers, P. van Rossum, R. Verdult, R. Wichers Schreur and B. Jacobs. Dismantling MIFARE Classic. In European Symposium on Research in Computer Security (ESORICS), LNCS 5283, 97-117, 2008.","journal-title":"European Symposium on Research in Computer Security (ESORICS)"},{"key":"29_CR11","unstructured":"J.A. Halderman, S.D. Schoen, N. Heninger, W Clarkson, W Paul, J.A. Calandrino, A.J. Feldman, J. Appelbaum and E.W. Felten. Lest We Remember: Cold Boot Attacks on Encryption Keys. In 17th USENIX Security Symposium, 45-60, 2008."},{"key":"29_CR12","first-page":"5","volume":"5","author":"M. Joye","year":"2007","unstructured":"M. Joye and \u00c7.K. Ko\u00e7. Side-channel attacks against OpenSSL. In The Security Newsletter, 5:5-6, 2007.","journal-title":"The Security Newsletter"},{"key":"29_CR13","first-page":"104","volume":"1109","author":"P.C. Kocher","year":"1996","unstructured":"P.C. Kocher. Timing Attacks on Implementations of Diffe-Hellman, RSA, DSS, and Other Systems. In Advances in Cryptology (CRYPTO), Springer-Verlag LNCS 1109, 104-113, 1996.","journal-title":"Advances in Cryptology (CRYPTO)"},{"key":"29_CR14","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume":"1666","author":"P.C. Kocher","year":"1999","unstructured":"P.C. Kocher, J. Jaffe and B. Jun. Differential Power Analysis. In Advances in Cryptology (CRYPTO), Springer-Verlag LNCS 1666, 388-397, 1999.","journal-title":"Advances in Cryptology (CRYPTO)"},{"key":"29_CR15","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1007\/978-3-540-85855-3_2","volume":"5229","author":"Y Lindell","year":"2008","unstructured":"Y Lindell, B. Pinkas, N. Smart. Implementing two-party computation effciently with security against malicious adversaries. In Security and Cryptography for Networks (SCN), Springer-Verlag LNCS 5229, 2-20, 2008.","journal-title":"In Security and Cryptography for Networks (SCN)"},{"key":"29_CR16","first-page":"555","volume":"3027","author":"PQ. Nguyen","year":"2004","unstructured":"PQ. Nguyen. Can We Trust Cryptographic Software? Cryptographic Flaws in GNU Privacy Guard v1.2.3. In Advances in Cryptology (EUROCRYPT), Springer-Verlag LNCS 3027, 555-570, 2004.","journal-title":"Advances in Cryptology (EUROCRYPT)"},{"key":"29_CR17","unstructured":"National Institute of Standards and Technology (NIST). Software Errors Cost U.S. Economy $59.5 Billion Annually. Available from: http:\/\/www.nist.gov\/public_affairs\/releases\/n02-10.htm , 2002."},{"key":"29_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-45146-4_1","volume":"2729","author":"A. Shamir","year":"2003","unstructured":"A. Shamir, E. Tromer. Factoring Large Numbers with the TWIRL Device In Advances in Cryptology (Crypto), Springer-Verlag LNCS 2729, 1-26, 2003.","journal-title":"Advances in Cryptology (Crypto)"},{"key":"29_CR19","unstructured":"The Standish Group. The CHAOS Report. In http:\/\/www.standishgroup.com\/ , 1994."},{"key":"29_CR20","unstructured":"Trusted Computing Group (TCG). TPM Specification Version 1.2 Revision 103. October 2006. http:\/\/www.trustedcomputinggroup.org\/developers\/trusted_platform_module\/"}],"container-title":["ISSE 2009 Securing Electronic Business Processes"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-8348-9363-5_29.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,23]],"date-time":"2020-11-23T12:14:24Z","timestamp":1606133664000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-8348-9363-5_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783834809582","9783834893635"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-8348-9363-5_29","relation":{},"subject":[],"published":{"date-parts":[[2010]]}}}